Best Solix EDMS Alternatives in 2024

Find the top alternatives to Solix EDMS currently available. Compare ratings, reviews, pricing, and features of Solix EDMS alternatives in 2024. Slashdot lists the best Solix EDMS alternatives on the market that offer competing products that are similar to Solix EDMS. Sort through Solix EDMS alternatives below to make the best choice for your needs

  • 1
    Satori Reviews
    See Software
    Learn More
    Compare Both
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 2
    DATPROF Reviews
    Mask, generate, subset, virtualize, and automate your test data with the DATPROF Test Data Management Suite. Our solution helps managing Personally Identifiable Information and/or too large databases. Long waiting times for test data refreshes are a thing of the past.
  • 3
    Titaniam Reviews
    Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022.
  • 4
    Immuta Reviews
    Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals.
  • 5
    IRI Voracity Reviews

    IRI Voracity

    IRI, The CoSort Company

    IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.
  • 6
    K2View Reviews
    K2View believes that every enterprise should be able to leverage its data to become as disruptive and agile as possible. We enable this through our Data Product Platform, which creates and manages a trusted dataset for every business entity – on demand, in real time. The dataset is always in sync with its sources, adapts to changes on the fly, and is instantly accessible to any authorized data consumer. We fuel operational use cases, including customer 360, data masking, test data management, data migration, and legacy application modernization – to deliver business outcomes at half the time and cost of other alternatives.
  • 7
    IRI FieldShield Reviews

    IRI FieldShield

    IRI, The CoSort Company

    Varies by component/scope
    IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps.
  • 8
    TCS MasterCraft DataPlus Reviews
    Data management software is used mainly by enterprise business teams. Data management software must be intuitive, automated, and intelligent. Data management activities must also adhere to specific industry and data protection regulations. Data must be accurate, consistent, high quality, and easily accessible to enable business teams to make informed, data-driven strategic business decisions. Integrates data privacy, data quality management and test data management. Service engine-based architecture allows for efficient handling of growing data volumes. Uses a user-defined function framework with python adapter to handle niche data processing needs. This provides a minimal layer of governance for data quality and privacy management.
  • 9
    TestBench for IBM i Reviews

    TestBench for IBM i

    Original Software

    $1,200 per user per year
    Test and verify data management for IBM iSeries, IBM iSeries and AS/400. Complex IBM i applications need to be tested from top to bottom and into the data wherever it is. TestBench IBM I is a proven, comprehensive solution for test data management, verification, and unit testing that integrates with other solutions to ensure application quality. Stop copying all the data and focus on what you need. You can select or sample data that has been kept in full referential integrity. You can choose which fields should be protected and then use a variety obfuscation techniques to protect your data. Track every insert, update, and delete. You can create rules to ensure that data failures are automatically flagged. Avoid painful save/restores, and stop trying to explain bad test results that were based on poor data. Although it is a proven method of verifying your test results, comparing outputs can be tedious and prone to error. This unique solution can save you hours.
  • 10
    Protecto Reviews
    As enterprise data explodes and is scattered across multiple systems, the oversight of privacy, data security and governance has become a very difficult task. Businesses are exposed to significant risks, including data breaches, privacy suits, and penalties. It takes months to find data privacy risks within an organization. A team of data engineers is involved in the effort. Data breaches and privacy legislation are forcing companies to better understand who has access to data and how it is used. Enterprise data is complex. Even if a team works for months to isolate data privacy risks, they may not be able to quickly find ways to reduce them.
  • 11
    IBM InfoSphere Optim Reviews
    Organizations can support their business goals by managing data well over its life span. Decommissioned applications and historical transaction records can be archived. However, you will still have access to the data for queries and reporting. You can scale data across applications, operating systems, and hardware platforms to improve security, speed up release cycles, and reduce costs. Data archiving is critical to the performance of mission-critical enterprise systems. Reduce data growth issues at the source, increase efficiency, and minimize the risks associated managing structured data throughout its life. Unstructured data can be protected in the testing, development, and analytics environments throughout an enterprise.
  • 12
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 13
    IRI DarkShield Reviews

    IRI DarkShield

    IRI, The CoSort Company

    5000
    IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS.
  • 14
    Dataguise Reviews
    Data privacy and security should not be a hindrance to your analytics-driven innovation efforts. Dataguise offers flexible encryption and masking options to protect sensitive data. This will ensure that your business is protected. Fast-track delivery of data sets can be achieved for analysis in real time, allowing for better insights and better decisions. Customers of Dataguise have many and changing needs. We know that our customers need more than just the solutions and services we offer. This is why we have built a strong network with carefully selected partners. This executive guide will show you how to maximize data value while protecting data privacy. Dataguise is more reliable than other data discovery tools, has a longer history, supports a wider range of data types, repositories, delivers lower false positive results, and scans data at a larger scale more reliably. Dataguise gives businesses the confidence to act in the best interest of their data.
  • 15
    CipherTrust Data Security Platform Reviews
    Thales has been pushing the boundaries with the CipherTrust Data Security Platform. This platform removes complexity from data security, speeds up compliance time, and protects cloud migrations. This next-generation platform, built on a modern microservices architecture, was designed for cloud computing. It includes Data Discovery and Classification and fuses together the best features of the Vormetric Data Security Portal, KeySecure, and connector products. CipherTrust Data Security Platform combines data classification, data protection, unprecedented granular access control, and centralized key management all in one platform. This means that your business will have fewer resources for data security operations, fewer compliance controls, and a significantly lower risk. The CipherTrust Security Platform integrates a range of data-centric security products that combine data protection, discovery, and control into one platform.
  • 16
    Imperva Data Security Fabric Reviews
    Protect data at scale using a multicloud, hybrid, enterprise-class security solution for all types of data. Extend the data security across hybrid, multicloud and on-premises environments. Discover and classify unstructured, semi-structured & structured data. Prioritize data risks for incident context as well as additional data capabilities. Centralize data management via a single data service or dashboard. Protect data from exposure and avoid breaches. Simplify data-centric compliance, governance, and security. Unify the view to gain insight into at-risk data, users and data. Monitor Zero Trust and policy enforcement. Automated workflows and automation can save you time and money. Support for hundreds file shares and data repositories, including public, datacenter, and third-party cloud service. Cover your immediate needs and future integrations, as you transform or extend cloud use cases.
  • 17
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 18
    DOT Anonymizer Reviews

    DOT Anonymizer

    DOT Anonymizer

    €488 per month
    Mask your personal information to ensure it looks and behaves like real data. Software development needs realistic test data. DOT Anonymizer masks test data and ensures its consistency across all data sources and databases. The use of personal data or identifying information outside of production is prohibited (development, testing and training, BI, external services providers, etc.). Data leakage is a major concern. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. You can retain the original format of data by anonymizing it. Your teams can work with fictional, but realistic data. Manage your data sources to maintain their usability. Use DOT Anonymizer from your own applications. Consistency in anonymizations across DBMS and platforms. To ensure realistic data, maintain relations between tables. Anonymize any database type and file, such as CSV, XML or JSON.
  • 19
    Gretel Reviews
    Privacy engineering tools delivered as APIs. In minutes, you can synthesize and transform data. Trust your users and the community. Gretel's APIs allow you to instantly create anonymized or synthetic data sets so that you can safely work with data while protecting your privacy. Access to data must be faster in order to keep up with the development pace. Gretel's data privacy tools bypass blockers, and allow for Machine Learning and AI applications to access data faster. Gretel Cloud runners makes it easy to scale up your workloads to the cloud or keep your data safe by running Gretel containers within your own environment. Developers will find it much easier to train and create synthetic data using our cloud GPUs. Scale workloads instantly with no infrastructure required. Invite colleagues to collaborate on cloud projects, and share data between teams.
  • 20
    Informatica Test Data Management Reviews
    We can help you find, create, and subset data for test data; visualize test coverage; and protect data so that you can concentrate on development. Automate provisioning synthetically, subsetted, or masked data for development and testing purposes. Consistent masking across databases and within databases allows you to quickly identify sensitive data locations. To improve testers' efficiency, store, augment, share, or reuse test datasets. To reduce infrastructure requirements and increase performance, provision smaller data sets. Our comprehensive collection of masking techniques can be used to protect data across applications. To ensure solution integrity and speed deployments, support packaged applications. To align with data governance initiatives, engage risk, compliance, audit and other teams. Test efficiency can be improved with reliable, trusted production data sets. Server and storage footprints can be reduced with data sets that are targeted for each team.
  • 21
    IBM Security Guardium Data Encryption Reviews
    This suite of integrated encryption products will help you comply with industry regulations and protect your file and database data. IBM Security Guardium Data Encryption is an integrated suite of products that are built on a common infrastructure. These highly-scalable solutions offer encryption, tokenization and data masking capabilities. They also have key management capabilities. This allows you to protect and control access to files, databases, and containers in the hybrid multicloud-securing environments that include on-premise, cloud, virtual, big-data, and on-premise assets. Organizations can comply with industry and government regulations by securely encrypting file or database data using such functionalities like tokenization, key rotation, data masking, and data masking. Guardium Data Encryption's capabilities, such as data access audit logging and tokenization, key management, data masking, data masking, and data masking, help meet regulations like HIPAA, CCPA, or GDPR.
  • 22
    BMC Compuware File-AID Reviews
    Agile DevOps teams today need to be able to move faster. BMC Compuware File AID is a cross-platform data and file management solution that allows developers and QA staff to quickly access the data and files they need, rather than searching for them. Developers spend less time on data-related tasks and more time developing new functionality or managing production issues. You can make code changes with confidence by rightsizing your test data without worrying about unintended consequences. File-AID allows developers to: Effectively manage files across platforms All file types are available, regardless of format or record length, for application integration To simplify the validation of test results, compare data files and objects You can easily reformat files instead of starting from scratch by simply changing an existing file format. Extract and load related data from multiple files and databases More
  • 23
    EMS Data Generator for MySQL Reviews

    EMS Data Generator for MySQL

    EMS Software Development

    $60 per year
    EMS Data Generator for MySQL is a powerful tool that generates test data for MySQL database tables. It also allows you to save and modify scripts. This utility allows you to simulate a database production environment. It allows you to populate multiple MySQL database tables simultaneously, set value ranges and generate MySQL char fields using mask. You can also define tables and fields for data generation, create lists of values manually, select them from SQL queries, and set generation parameters for each type. There are many other features that allow you to generate MySQL test data quickly and easily. Data Generator for MySQL also includes a console application that allows you to quickly generate MySQL test data by using generation templates.
  • 24
    iMask Reviews
    iMask protects sensitive data at the Application Layer as well as the Database Layer. It offers flexible solutions that can be used for all types of use and all users, small, medium and large. Mask sensitive data at both the application and database levels to ensure your data's protection in production. You can set up rules in the product UI to allow role-based and user-based access controls that control who can access your sensitive information. You have the option to choose from more than 40 anonymization methods to maintain data consistency between production and nonproduction instances. You can set authorization rules to restrict who can see sensitive data based on geography, roles, departments, and other factors. Secure anonymization protocols can be enabled without affecting performance. Database embedded approach allows data to be deidentified without any changes in the application architecture or security protocols.
  • 25
    Oracle Data Masking and Subsetting Reviews
    Due to increasing security threats and expanding privacy regulations, it is imperative to limit the exposure of sensitive data. Oracle Data Masking and Subsetting allows database customers to improve security, speed compliance, and lower IT costs. It sanitizes production data for testing, development, and any other activities and easily eliminates unnecessary data. Oracle Data Masking and Subsetting allows for entire copies or subsets to be extracted from the database and obfuscated. This data can then be shared with business partners. Assuring continuity of applications, the integrity of the database is maintained. Application Data Modeling automatically detects columns in Oracle Database tables that contain sensitive information using built-in discovery patterns like national identifiers, credit cards numbers, or other personally identifiable information. It automatically detects parent-child relationships in the database.
  • 26
    iScramble Reviews
    You have the freedom to choose the anonymization method that best suits your needs - including tokenization, encryption, and masking techniques. This will ensure that sensitive data is protected in a delicate balance between security and performance. You can choose from over 60 different anonymization methods to protect sensitive data. Anonymization methods that provide consistent results across datastores and applications will help you maintain referential integrity. Anonymization methods that provide both performance and protection. You can choose to encrypt, tokenize or mask data depending on the use case. There are many ways to anonymize sensitive data. Each method provides adequate security and data usability. Protect sensitive data across data storage and applications, and maintain referential integrity. You can choose from a range of NIST-approved encryption or tokenization algorithms.
  • 27
    Randtronics DPM easyData Reviews
    DPM easyData is a high performance data spoofing and de-identification engine. Data spoofing techniques include masking, tokenization. anonymization, pseudonymization, encryption, and anonymization. DPM data spoofing processes, which replace sensitive data or parts with non-sensitive counterparts (creates fake information), is a powerful tool for data protection. DPM easyData, a software data security solution, allows web and database server applications and databases tokenize and anonymize data. It also applies masking policies to unauthorized users when retrieving sensitive information. The software provides a high degree of granularity by allowing users to be granted access to specific protection policies and the operations they can perform with them. DPM easyData is highly customizable and can protect and tokenize many types of data. The software is flexible, so users can define any input data or token format they wish.
  • 28
    Okera Reviews
    Complexity is the enemy of security. Simplify and scale fine-grained data access control. Dynamically authorize and audit every query to comply with data security and privacy regulations. Okera integrates seamlessly into your infrastructure – in the cloud, on premise, and with cloud-native and legacy tools. With Okera, data users can use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives.
  • 29
    IRI DMaaS Reviews

    IRI DMaaS

    IRI, The CoSort Company

    $1000 per day
    IRI Data Masking as a Service is a professional services engagement to secure PII. Step 1: IRI agrees under NDA terms to classify, analyze, and report on the sensitive, at-risk data in your sources. We will discuss an initial cost estimate then hone it with you during data discovery. Step 2: Transfer the unprotected data to a secure on-premise or cloud-based staging area or provide remote, supervised access to IRI to the data sources(s) at issue. We'll use the tools in the award-winning IRI Data Protector suite to mask that data according to your business rules, on an ad hoc or recurring basis. Step 3: Our experts can also move newly-masked data to incremental replicas in production or to lower non-production environments. From either, the data is now safe for analytic initiatives, development, testing, or training. Tell us if you need additional services, like re-ID risk scoring (expert determination) of the de-identified data. This approach provides the benefits of proven data masking solution technology and services without the need to learn and customize new software from scratch. If you do want to use the software in-house, you will have everything pre-configured for easier long-term self-use and modification.
  • 30
    Privacy1 Reviews

    Privacy1

    Privacy1

    $159 per month
    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level
  • 31
    Data Secure Reviews
    Protect sensitive SAP data. Find solutions to your SAP data security problems and comply with data privacy legislation, such as the EU's. General Data Protection Regulation (GDPR), South Africa’s POPI Act, and the California Consumer Privacy Act of 2018(CCPA) are all addressed with Data Secure™. Data security is essential in today's business environment. Data Secure™, a part of EPI USE Labs' Data Sync Manager (DSM) suite, solves all your data security problems. Data Secure is a comprehensive protection system that includes pre-defined masking rules. These rules can be used to scramble any non-key SAP field in any client-dependent SAP tables in a variety of ways (such as mapping table view, constant value, clear field), These rules can be extended to meet your security requirements. Data Secure enables your company to meet all well-known data privacy and protection standards such as the General Data Protection Regulation (GDPR), Sarbanes Oxley and the BDSG (Bundesdatenschutzgesetz).
  • 32
    OneVault Reviews

    OneVault

    Donoma Software

    $2.50/month/user
    Secure Multi-Data Archiving with a Single Interface OneVault archives email and all new data types that your organization uses today. Email, Instant Messaging and Teams, Zoom, Webex, and many other data types. OneVault gives you a single interface to archive from multiple systems. It is easy to organize consistent policies and support business continuity plans by centralizing important data in a secure cloud platform. e-Discovery is a single platform for managing and working with records. It is secure, transparent, and easy to use. OneVault combines the powerful features of our stand alone archiving solutions under one pane of glass. It is intuitive, secure, and scalable. Start with email and expand as new systems become available.
  • 33
    Accelario Reviews

    Accelario

    Accelario

    $0 Free Forever Up to 10GB
    DevOps can be simplified and privacy concerns eliminated by giving your teams full data autonomy via an easy-to use self-service portal. You can simplify access, remove data roadblocks, and speed up provisioning for data analysts, dev, testing, and other purposes. The Accelario Continuous DataOps platform is your one-stop-shop to all of your data needs. Eliminate DevOps bottlenecks, and give your teams high-quality, privacy-compliant information. The platform's four modules can be used as standalone solutions or as part of a comprehensive DataOps management platform. Existing data provisioning systems can't keep pace with agile requirements for continuous, independent access and privacy-compliant data in autonomous environments. With a single-stop-shop that provides comprehensive, high-quality, self-provisioning privacy compliant data, teams can meet agile requirements for frequent deliveries.
  • 34
    Qlik Gold Client Reviews
    Qlik Gold Client increases the efficiency, security, and cost of managing SAP test data. Qlik Gold Client eliminates development workarounds by allowing you to easily move configuration, master, or transactional data subsets into test environments. Rapidly create, copy and synchronize transactional information from production to nonproduction targets. Non-production data can be identified, selected, and deleted. A simple interface allows you to manage complex and powerful data transformations. Automate data selection and allow hands-free refresh cycles of test data, reducing the time and effort required for test data management. Qlik Gold Client offers several options to protect PII information in non-production environments through data masking. Data masking is a set of rules that "scrambles" your production data when it is replicated to non-production environments.
  • 35
    IRI Data Manager Reviews
    The IRI Data Manager suite from IRI, The CoSort Company, provides all the tools you need to speed up data manipulation and movement. IRI CoSort handles big data processing tasks like DW ETL and BI/analytics. It also supports DB loads, sort/merge utility migrations (downsizing), and other data processing heavy lifts. IRI Fast Extract (FACT) is the only tool that you need to unload large databases quickly (VLDB) for DW ETL, reorg, and archival. IRI NextForm speeds up file and table migrations, and also supports data replication, data reformatting, and data federation. IRI RowGen generates referentially and structurally correct test data in files, tables, and reports, and also includes DB subsetting (and masking) capabilities for test environments. All of these products can be licensed standalone for perpetual use, share a common Eclipse job design IDE, and are also supported in IRI Voracity (data management platform) subscriptions.
  • 36
    eperi Gateway Reviews
    You alone have complete control over the encryption. All Systems - One solution. The patented template concept allows you to use the eperi® Gateway to protect your data for all of your (cloud-based) applications. The eperi®, Gateway allows your employees to continue working normally while it encrypts the data transparently, preserving the central functions (such as sorting and searching) of your applications. Cloud applications can be used while remaining compliant with financial industry regulations, such as privacy-preserving analytics. IoT is a collection of smart machines and products which collect data automatically and independently. You can protect your data and ensure compliance with the law by using encryption.
  • 37
    OpenText Data Express Reviews
    OpenText Data Express manages the test data environment. It improves test results, lowers testing costs, secures customer data against loss or misuse and enables accelerated delivery. Data Express automates generation of test data environments to reduce elapsed times by up to 80%. By masking sensitive data, test data retains the value for testing and keeps it safe from unauthorized uses. Data Express is a repository for test data knowledge. It provides a variety of management tools that allow test managers to control the generation of test data.
  • 38
    Redgate SQL Data Generator Reviews

    Redgate SQL Data Generator

    Redgate Software

    $405 per user per year
    It can generate generators instantly based on field length, table and column names, and other constraints. These generators can be customized to your needs. SQL Server Management Studio makes it easy to create large amounts of data in just a few clicks. Column-intelligent Data Generation - Generate data in one column based upon the data in another. Foreign key data can be created with greater flexibility and manual control. Shareable custom generators – Save regexp and SQL statement templates to share with your colleagues. You can write your own Python generators to create any additional data you require. Seeded random data generation makes it possible to generate the same set of data each time. Foreign key support for generating consistent data across multiple tables.
  • 39
    IRI RowGen Reviews

    IRI RowGen

    IRI, The CoSort Company

    8000 on first hostname
    IRI RowGen generates rows ... billions of rows of safe, intelligent test data in database, flat-file, and formatted report targets ... using metadata, not data. RowGen synthesizes and populates accurate, relational test data with the same characteristics of production data. RowGen uses the metadata you already have (or create on the fly) to randomly generate structurally and referentially correct test data, and/or randomly select data from real sets. RowGen lets you customize data formats, volumes, ranges, distributions, and other properties on the fly or with re-usable rules that support major goals like application testing and subsetting. RowGen uses the IRI CoSort engine to deliver the fastest generation, transformation, and bulk-load movement of big test data on the market. RowGen was designed by data modeling, integration, and processing experts to save time and energy in the creation of perfect, compliant test sets in production and custom formats. With RowGen, you can produce and provision safe, smart, synthetic test data for: DevOps, DB, DV, and DW prototypes, demonstrations, application stress-testing, and benchmarking -- all without needing production data.
  • 40
    Xeotek Reviews
    Xeotek is a powerful desktop and web application that helps companies explore and develop data streams and applications faster. Xeotek KaDeck was created for developers, business users, and operations personnel. KaDeck gives business users, developers, operations, and business users insight into data and processes. This benefits the entire team: less misunderstandings, less work, more transparency. Xeotek KaDeck gives you control over your data streams. You can save hours by getting insights at the application and data level in projects or your day-to-day operations. KaDeck makes it easy to export, filter, transform, and manage data streams. You can run JavaScript (NodeV4) code and transform & create test data. You can also view & modify consumer offsets. Manage your streams or topics, Kafka Connect instance, schema registry, ACLs, and Kafka Connect topics from one user interface.
  • 41
    Solix Test Data Management Reviews
    Accuracy in test data is key to application development and testing quality. This is why most application development teams insist that test data be populated frequently from production databases. A Test Data Management (TDM), program may have six to eight full copies/clones of the production database to use as development and test instances. Provisioning test data without proper automation is inefficient, time-consuming, and storage-intensive. It could also expose sensitive data to unauthorized personnel, leading to compliance risks. Cloning creates a data governance problem and a resource drain. Test and development databases can also be not updated regularly enough, leading to inaccurate test results and even failures. The cost of application development rises as errors are discovered later in the development cycle.
  • 42
    Datagen Reviews
    A self-service platform for synthetic data, with a focus on object and human data. The Datagen Platform gives you granular control over the data generation process. Analyzing your neural networks can help you understand what data is required to improve them. You can then easily generate the data that you need to train your network. Datagen is a powerful platform that can help you solve your problems. It allows you to generate high-quality, high-variety, domain-specific, simulated artificial data. Advanced capabilities include the ability to simulate dynamic people and objects within their context. Datagen gives CV teams unprecedented flexibility to control visual outcomes in a variety of 3D environments.
  • 43
    Actifio Reviews
    Integrate with existing toolchain to automate self-service provisioning, refresh enterprise workloads, and integrate with existing tools. Through a rich set APIs and automation, data scientists can achieve high-performance data delivery and re-use. Any cloud data can be recovered at any time, at any scale, and beyond legacy solutions. Reduce the business impact of ransomware and cyber attacks by quickly recovering with immutable backups. Unified platform to protect, secure, keep, govern, and recover your data whether it is on-premises or cloud. Actifio's patented software platform turns data silos into data pipelines. Virtual Data Pipeline (VDP), provides full-stack data management - hybrid, on-premises, or multi-cloud -- from rich application integration, SLA based orchestration, flexible movement, data immutability, security, and SLA-based orchestration.
  • 44
    GxQuality Reviews
    Application for Automated Software Quality Control GxQuality™, which provides end-to–end quality assurance, leverages automation to generate test scenarios. This data validates project test results using CI/CD, CV. This solution provides traceability to test conditions and test results with the availability of managed services by onshore and offshore teams. We offer comprehensive enterprise-wide testing solutions, including DevOps and CV, as well as release management solutions.
  • 45
    BMC Compuware Topaz for Enterprise Data Reviews
    Visualize large numbers of data objects, understand their relationships and tune related data extracts for optimal test data. Comparing files on different LPARs allows you to quickly and easily assess the impact of your changes. Developers and testers can simplify the complex task of managing and preparing data for testing. This allows them to perform data-related tasks without having to write programs or scripts, code SQL or use multiple utilities. Developers, analysts, and test engineers can be more self-sufficient by enabling them to provision data as needed, decreasing reliance on subject matter specialists. Better testing scenarios can improve application quality, making it easier to create data extracts for testing purposes and accurately identifying the effects of data changes.
  • 46
    Informatica Dynamic Data Masking Reviews
    Your IT organization can use flexible masking rules to limit sensitive data with flexible masking rules based upon the authentication level of a user. It ensures compliance by blocking, auditing and alerting users, IT personnel and outsourced teams that access sensitive information. Data masking solutions can be easily customized to meet different regulatory or business needs. Protect sensitive and personal information while supporting cloud-based, offshoring and outsourcing initiatives. Secure big data using dynamic masking of sensitive data in Hadoop.
  • 47
    Informatica Persistent Data Masking Reviews
    While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations.
  • 48
    Doculayer Reviews
    You can forget about manual content classification or data entry. Doculayer.ai provides a configurable workflow that includes document processing services such as OCR, document type classification and topic classification, as well data extraction and masking. Doculayer.ai allows business users to take control of their learning and training by providing an intuitive user interface that makes labeling documents and data easy. Our hybrid data extraction approach allows machine learning models to be combined with patterns, rules, and library scripts to produce better results in less time. Data masking is an option to anonymize or pseudonymize sensitive data in documents. Doculayer.ai provides document intelligence to your Content Services Platform and Business Process Management systems. Your existing IT environment can be augmented for document processing by machine learning, natural language processing and computer vision technologies.
  • 49
    BizDataX Reviews
    BizDataX provides production-level data masking. It allows compliance with GDPR, and other regulations by masking customers' identities while preparing data to be used by testers and developers. The risk of using production data is greatly reduced by using anonymized/masked data. You should be focusing on business requirements, policy management, sensitive data governance, and other regulations. You will need to track the inventory of databases, data sources, tables, and where sensitive data is located. Manage large customer databases and exchange information with online partners shops and parcel delivery businesses. Data anonymization is a way to ensure regulatory compliance in the management of medical records.
  • 50
    LiveRamp Reviews
    All of our work is focused on making data accessible and safe for businesses. Our Safe Haven platform empowers customer intelligence, engages customers on a large scale, and opens up new opportunities for business growth. Our platform gives enterprises full control over how data is accessed and used with industry-leading software solutions for data activation, identity, and collaboration. You can gain access to data, generate valuable business insights, and drive revenue. However you retain full control over data access and use at all times. You can accurately address your target audiences across any channel, platform or publisher, and safely translate data between identity space spaces to improve results. You can protect your customer data using the most advanced privacy-preserving technologies and advanced techniques that allow for data movement to be minimized while still allowing insight generation.